Corporate Partners

Top IT Security Bloggers

  • Shellshock – How Bad Can It Get?

    TrendLabs - Malware Blog
    In the immediate aftermath of the Bash vulnerability known as Shellshock, we have already seen some attacks using it to deliver DDoS malware onto Linux systems. However, given the severity of this vulnerability, it is almost certain that we will see bigger, more severe attacks. What are some of the scenarios we could potentially see? Servers Web servers are […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroShellshock – How Bad Can It Get?
  • Shellshock – How Bad Can It Get?

    Trend Micro - Security Intelligence
    In the immediate aftermath of the Bash vulnerability known as Shellshock, we have already seen some attacks using it to deliver DDoS malware onto Linux systems. However, given the severity of this vulnerability, it is almost certain that we will see bigger, more severe attacks. What are some of the scenarios we could potentially see? Servers Web servers are […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroShellshock – How Bad Can It Get?
  • Apple pulls iOS 8.0.1 update, tells users to roll back to iOS 8

    Sophos - Naked Security
    Apple's telling users to ditch the update after it knocked out cellular service and disabled Touch ID for iPhones, on top of a list of other glitches - stalling, crashing and more.
  • ‘Shellshock’ Bug Spells Trouble for Web Security

    Krebs on Security
    As if consumers weren’t already suffering from breach fatigue: Experts warn that attackers are exploiting a critical, newly-disclosed security vulnerability present countless networks and Web sites that rely on Unix and Linux operating systems. Experts say the flaw, dubbed "Shellshock," is so intertwined with the modern Internet that it could prove challenging to fix, and in the short run is likely to put millions of networks and countless consumer records at risk of compromise.
  • Bash Vulnerability (Shellshock) Exploit Emerges in the Wild, Leads to BASHLITE Malware

    Trend Micro - Security Intelligence
    Just several hours after the news on the bash vulnerability (covered under CVE-2014-7169) broke out; it was reportedly being exploited in the wild already.  This vulnerability can allow execution of arbitrary code thus compromising the security of systems. Some of the possible scenarios that attackers can do range from changing the contents of web server and […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroBash Vulnerability (Shellshock) Exploit Emerges in the Wild, Leads to BASHLITE Malware
  • Bash Vulnerability (Shellshock) Exploit Emerges in the Wild, Leads to BASHLITE Malware

    TrendLabs - Malware Blog
    Just several hours after the news on the bash vulnerability (covered under CVE-2014-7169) broke out; it was reportedly being exploited in the wild already.  This vulnerability can allow execution of arbitrary code thus compromising the security of systems. Some of the possible scenarios that attackers can do range from changing the contents of web server and […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroBash Vulnerability (Shellshock) Exploit Emerges in the Wild, Leads to BASHLITE Malware
  • Bash “Shellshock” vulnerability – what you need to know

    Sophos - Naked Security
    Shellshock is the media-friendly name for a remote code execution hole in Bash, a command shell commonly used on Linux and UNIX systems.

    Paul Ducklin explains...
  • FCC advised on Remediation of Server-based DDoS Attacks

    Arbor Networks
    Yesterday, the Communications Security, Reliability and Interoperability Council (CSRIC), a federal advisory committee to the Federal Communications Commission (FCC), submitted its final report on Remediation of Server-based DDoS Attacks.
    The CSRIC’s Working Group 5 was tasked with developing recommendations for communications providers to enable them to mitigate the impact of high volume DDoS attacks launched from large data center and hosting environments.
    The final report includes a comprehensive look at the DDoS threat landscape, covering everything from the massive size [...]
  • The Shellshock vulnerability, aka the “Bash Bug”

    Trend Micro - Cloud Security Blog
    Here you will find the latest blogs from Trend Micro’s experts along with a comprehensive look at the latest vulnerability the “Bash Bug.” We encourage you to scroll through the various blogs, provide comments and enjoy the in-depth knowledge that Trend Micro has to offer. Please add your thoughts in the comments below and follow...
  • What You Need To Know About Shellshock, aka the “Bash Bug”

    Trend Micro - Cloud Security Blog
    The Bug This week brings us another wide spread, critical vulnerability that required immediate attention. Perhaps even larger in scope than Heartbleed, Shellshock affects a very common open source program called “bash.” Bash is a command shell commonly deployed on Linux, BSD, and Mac OS X. CVE–2014–7169 provides the details. The tl:dr takeaway is this bug is widespread, has...

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place